IDM

Part III- Four Strategies to Assess Data Quality for Identity Management

Identity Management (IDM) systems rely on accurate user data in order to manage user access, enforce policies, and support network security. Historically, organizations have not had a good grasp on the required data profile of their user populations, including employees, contractors, partners, and vendors. In fact, many organizations know very little about their contractor populations […]

Part III- Four Strategies to Assess Data Quality for Identity Management Read More »

Part II – The 5 Dimensions of Data Quality

Data quality is a term that refers to the reliability and validity of user-level data collected in the Authoritative Systems that feed your Identity and Access Management system (IAM). Quality is measured by how accurately the user data in the system reflects actual information available in the real world. In Part I of this series, we

Part II – The 5 Dimensions of Data Quality Read More »

Part I – Data Quality is the lifeblood of Identity Management (IAM)

At most large enterprises, the IT environment has evolved over decades into an “accidental architecture” with everything from mainframes, PCs, and LANs to the Internet, cloud, and mobile devices, all connected by a poorly tied together patchwork that limits speed, flexibility, and innovation. IAM offers a new model for managing users and devices within the

Part I – Data Quality is the lifeblood of Identity Management (IAM) Read More »

The Identity of Things vs. Traditional IAM

Gartner has coined the term “The Identity of Things “(IDoT) as “a new extension to identity management meant to encompass all identities, regardless of whether it is a person or device”. We like the concept, and our customer have dipped their toes in the waters and started incorporating IoT into their IAM strategies and roadmaps. Here’s

The Identity of Things vs. Traditional IAM Read More »

Taking the pain out of User Onboarding with IAM

When a new employee is hired, setting up access to all files, applications, databases and so on is fundamental, because users cannot do anything without it.  And while you’re at it, don’t forget arranging for parking passes, cardkey access, and permissions to enter certain areas of the building. In short, there is a lot that

Taking the pain out of User Onboarding with IAM Read More »

How do you manage non-employee identities?

We were recently asked this question, and managing Non-Employee Identities is a common challenge for organizations when implementing an Identity and Access Management (IAM) solution. We work with a wide range of clients across the Fortune 1000 and this is what we have seen: 1) 80% build a home grown web-based registration form that creates

How do you manage non-employee identities? Read More »

Mitigating the High Cost of Forgotten Passwords

Password resets comprise roughly 30% of all Help Desk calls and not only impact worker productivity, but also consume valuable IT resources from your support team. What if your associates could take charge of how they reset their passwords and eliminate unnecessary calls to the Help Desk? Password self-service based on security questions is the

Mitigating the High Cost of Forgotten Passwords Read More »

implementing identity management

Implementing Identity Management – Two Steps Forward, One Step Back

Can implementing Identity Management (IDM) degrade a company’s provisioning performance? In a word, yes! You may be asking yourself how this is possible when we would expect that linking to the HR system and automating routine provisioning tasks would actually enhance service. While that is the ultimate goal of the IDM solution (integration and automation),

Implementing Identity Management – Two Steps Forward, One Step Back Read More »

Scroll to Top